General
-
Target
c7b4ec460b896ccd9f368467d06ee44b.bin
-
Size
21KB
-
Sample
241014-lxr96axhpn
-
MD5
4eec673669c235d3ca883234b46f3f1b
-
SHA1
75310ea8092fded7ec61b09ec2fc405c5e46e7d4
-
SHA256
6ca520e97dfe6393496e17c91939b34a2e5177f6b63fdeabd22d12bf6469f044
-
SHA512
2e8b438c2e3e4514fa6a5500a71e8b11aeffdc345d42e24f6ef35db2afca99c55b528852b4c210313f10694a372e121f7aff0ab0176efabb2b2972ad6f9a6c6e
-
SSDEEP
384:u9Za/Wju6UmS5cQX2EeVb48egTQJ6h49hQqmY5zDgi8me5dPITyA9HTQ9FxPH:oXu6U5BObVeoKU4W+Dg7b5dwTyA9Ql
Static task
static1
Behavioral task
behavioral1
Sample
7b33de62dafef125fe428afe47e9a353749a6632d58809ce428b7514886b49b6.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b33de62dafef125fe428afe47e9a353749a6632d58809ce428b7514886b49b6.rtf
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
newest
107.173.4.16:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FI789R
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
7b33de62dafef125fe428afe47e9a353749a6632d58809ce428b7514886b49b6.rtf
-
Size
86KB
-
MD5
c7b4ec460b896ccd9f368467d06ee44b
-
SHA1
58d4ed5d5791401f4555d6278a179e5c65563c8a
-
SHA256
7b33de62dafef125fe428afe47e9a353749a6632d58809ce428b7514886b49b6
-
SHA512
d82b5ecc391f92e17161ce7b98f62b273f9a51d6c294272aacc1efa1b2d2dc7c8c1095103197d6fe023b21d8b161978c4c6073aed78758649031da99fd687d9c
-
SSDEEP
768:t9QdTYkH9SFwul5U0mGL8ogS2fw6Vgr9JE:Mkkdzuglo8og3fJVmE
Score10/10-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-